Authentication Bypass in NATS-Server Affects NATS.io Messaging System
CVE-2026-33248

4.2MEDIUM

Key Information:

Vendor

Nats-io

Vendor
CVE Published:
25 March 2026

What is CVE-2026-33248?

NATS-Server, a robust messaging system for cloud and edge applications, is susceptible to an authentication bypass issue prior to versions 2.11.15 and 2.12.6. This vulnerability arises when mTLS is used for client identity verification, particularly when using the verify_and_map function to derive NATS identities from the Subject DN of client certificates. Certain rare patterns of RDN may not be strictly enforced, leading to potential authentication bypass. While exploitation requires a valid client certificate from a trusted CA and involves highly improbable DN naming patterns, administrators with particular attention to these configurations should assess their security practices. Upgrading to versions 2.11.15 or 2.12.6 is strongly recommended to mitigate this issue. Alternatively, a review of CA issuance policies may help address potential vulnerabilities.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

nats-server < 2.11.15 < 2.11.15

nats-server >= 2.12.0-RC.1, < 2.12.6 < 2.12.0-RC.1, 2.12.6

References

CVSS V3.1

Score:
4.2
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.